Location-based localized alternate, disjoint and multi-path routing algorithms for wireless networks

Size: px
Start display at page:

Download "Location-based localized alternate, disjoint and multi-path routing algorithms for wireless networks"

Transcription

1 J. Parallel Distrib. Comput. 63 (2003) Location-based localized alternate, disjoint and multi-path routing algorithms for wireless networks Xu Lin a and Ivan Stojmenovic b,c, * a Cognos Inc., Slater Str., Ottawa, Ont., Canada K1P 5H9 b SITE, Department of Computer Science, University of Ottawa, 550 Cumberland Street, Ottawa, Ont., Canada K1N 6N5 c DISCA, IIMAS, UNAM, Direcci!on Circuito Escolar s/n, Ciudad Univ., Coyoac!an, M!exico D.F , Mexico Received 17 October 2002 Abstract Recently, several fully distributed (localized) location-based routing protocols for a mobile ad hoc network were reported in literature. They are variations of directional (DIR), geographic distance (GEDIR) or progress-based (MFR) routing methods. In DIR methods, each node A (the source or intermediate node) transmits a message m to several neighbors whose direction is closest to the direction of D: In MFR (most forward progress within radius), and GEDIR (GEographic DIstance Routing) methods, when node A wants to send m to node D; it forwards m to its neighbor C whose projection or distance (respectively) is closest to D among all neighbors of A: The same procedure is repeated until D; if possible, is eventually reached. In this paper, we introduce three variants of multiple path c-gedir, c-dir and c-mfr methods, in which m is initially sent to c best neighbors according to corresponding criterion, and afterwards, on intermediate nodes, it is forwarded to only the best neighbor. In the original c-path method, only the first received copy at intermediate nodes is forwarded to the best neighbor. In the alternate c-path method, the ith received copy is forwarded to ith best neighbor, according to the selected criterion. In the disjoint c-path method, each intermediate node, upon receiving the message, will forward it to its best neighbor among those who never received the message (thus, in effect, the methods attempts to create c disjoint paths). The simulation experiments with random graphs show that disjoint multiple path methods provide high success rates, and small hop counts for small values of c: They also have reduced flooding rates compared to the best existing multiple-path methods and/or methods that require memorizing past traffic, such as recently proposed LAR2, f- GEDIR, and DFS based routing, and can serve as a basis for scalable QoS routing in wireless networks. r 2002 Elsevier Science (USA). All rights reserved. Keywords: Routing; Wireless networks; Distributed algorithms; Mobile computing; Shortest path 1. Introduction In this paper we consider the routing task, in which a message is to be sent from a source node to a destination node in a given wireless network. Wireless networks of sensors are likely to be widely deployed in the near future because they greatly extend our ability to monitor and control the physical environment from remote locations and improve our accuracy of information obtained via collaboration among sensor nodes and online information processing at those nodes. Networking these sensors (empowering them with the ability to *Corresponding author. SITE, Department of Computer Science, University of Ottawa, 550, Cumberland Street, Ottawa, Ont., Canada K1N 6N5. address: ivan@site.uottawa.ca (I. Stojmenovic). coordinate amongst themselves on a larger sensing task) will revolutionize information gathering and processing in many situations. Sensor networks have been recently studied in [EGHK]. A similar wireless network that received significant attention in recent years is ad hoc network [IETF,MC]. Mobile ad hoc networks consist of wireless hosts that communicate with each other in the absence of a fixed infrastructure. Some examples of the possible uses of ad hoc networking include soldiers on the battlefield, emergency disaster relief personnel, and networks of laptops. A recent comprehensive survey of ad hoc networks is given in [G]. Rooftop networks, proposed in [Sh], are not mobile, but are deployed very densely in metropolitan areas (the name refers to an antenna on each building s roof, for line-of-sight with neighbors) as an alternative to wired networking offered by traditional telecommunication providers. Such a /02/$ - see front matter r 2002 Elsevier Science (USA). All rights reserved. doi: /s (02)

2 X. Lin, I. Stojmenovic / J. Parallel Distrib. Comput. 63 (2003) network also provides an alternative infrastructure in the event of failure of the conventional one, as after a disaster. A routing system that self-configures (without a trusted authority to configure a routing hierarchy) for hundreds of thousands of such nodes in a metropolitan area represents a significant scaling challenge. Commercial examples of static ad hoc networks include Metricom Ricochet [M] and Nokia Rooftop [N] systems. A broad variety of location-dependent services will become feasible in the near future due to the use of the Global Position System (GPS), which provides location information (latitude, longitude and possibly height) and global timing to mobile users. GPS cards will be deployed in each car and possibly in every user terminal. If GPS is not available, the distance between neighboring nodes can be estimated on the basis of incoming signal strengths. Relative coordinates of neighboring nodes can be obtained by exchanging such information between neighbors [CHH]. This paper will make use of geographic position of nodes in making routing decisions. Routes between two hosts in a wireless network may consist of hops through other hosts in the network. The task of finding and maintaining routes in a wireless network with moving nodes is non-trivial since host mobility causes frequent unpredictable topological changes. A number of protocols for achieving efficient routing have been recently proposed. A number of novel routing protocols are also available on the internet [IETF]. In this article we will discuss only position-based approaches (their survey is given in [U]). This paper is organized as follows. Section 2 lists desirable properties of a routing protocol for ad hoc networks. Section 3 reviews existing location-based routing methods, while Sections 4 and 5 describe new alternate, disjoint, and multi-path routing methods. The multi-path methods are compared with the best existing multi-path methods and/or methods that require nodes to memorize past traffic, LAR2, f-gedir, and DFS based routing in Section 6. Conclusion and references complete this paper. 2. Desirable properties of routing protocols for ad hoc networks Ad hoc networks consist of autonomous nodes that run their routines in asynchronous fashion. The communication algorithms between nodes are therefore all distributed. However, [EGHK] defined the class of localized algorithms, as distributed algorithms where simple local node behavior achieves a desired global objective. Localized algorithms therefore resemble greedy sequential algorithms. In a localized routing algorithm, each node makes the decision to which neighbor(s) to forward the message based solely on the location of itself, its neighboring nodes, and destination. In addition, each node is allowed to perform local computation. Non-localized algorithms, on the other hand, typically require the knowledge of the locations of all nodes in the network, and also the information about the existence of every edge in the graph. All non-localized routing algorithms proposed in literature are variations of shortest weighted path algorithm. Although ad hoc networks are fairly accurately modeled by unit graphs (where two nodes A and B in the network are neighbors if and only if the Euclidean distance between them is less than R; where R is the transmission radius that is equal for all nodes), nodes that are at distance less than R may have an obstacle between them blocking the communication, while two nodes at distance that exceeds R by a small amount may still be able to communicate (or a node may even choose whether to use that possible but power demanding link). The maintenance of shortest weighted path requires that information about edges, in addition to location of nodes, is broadcast to the whole network, which is a significant quadratic communication overhead, and may cause significant delays in delivery. Next, some nodes in the sensor or ad hoc network may be temporarily inactive, and non-localized algorithms need to know which of the nodes are active to make their best decisions. The activity information puts additional demand on the information update. For example, static nodes may need to broadcast such information to the whole network whenever they change their activity status while, at the same time, they have no need to update their location with the rest of the nodes. In order to preserve battery power over long periods of time, nodes may change their activity on a regular basis. Even worse scenario is a need for dying node to inform the whole network (in a non-localized approach) about its disappearance, causing further energy damages. Thus, non-localized shortest path algorithms may not be the best choice for a routing algorithm even in case of static networks (e.g. some kinds of sensor networks). This paper deals solely with localized algorithms. Macker and Corson [MC] listed qualitative and quantitative independent metrics for judging the performance of routing protocols. Desirable qualitative properties include: distributed operation, loop-freedom (to avoid a worst-case scenario of a small fraction of packets spinning around in the network), demand-based operation, and sleep period operation (when some nodes become temporarily inactive). It was shown in [SL1] that existing directional-based solutions [BCSW,KV,KSU] are not loop-free, while MFR algorithm [TK] and greedy and similar GEDIR algorithms [F,SL1] are loop-free. Some quantitative metrics that are appropriate for assessing the performance of any routing protocol

3 24 X. Lin, I. Stojmenovic / J. Parallel Distrib. Comput. 63 (2003) include [MC]: end-to-end data delay, and average number of data bits (or control bits) transmitted per data bits delivered. The later is a measure of communication overhead, and includes demand-based routing messages and location updates. Delivery rate [BMJHJ] is the ratio of numbers of messages received by destination and sent by senders. Despite high communication overhead (due to flooding an area toward destination), existing directional-based methods [BCSW,KV] report only 80 90% delivery rates. Our goal is to design multi-path routing algorithms with high delivery rate and low communication overhead, achieved by restricted flooding approach. The design of a routing algorithm for mobile wireless networks appears to be a very difficult problem, as argued in a recent book chapter [S1]. One possible approach [KV,KK,SL1,SL,SRV] is to limit location updates to neighboring nodes only, and use a variant of reactive source initiated destination search routing [BMJHJ], where routing is divided into three steps as follows: destination search with short messages (using multi-path strategies or flooding), routing from destination to sender (that is, reporting the position), and finally sending full message from source to destination. This strategy is adopted in previous research [KK,KV], and is suitable for quality-of-service routing. It works well with our proposed multi-path schemes, and was also used in LAR2 scheme [KV] and f-gedir [SL1] that were used for comparison in this paper. Other possible approaches [BCSW,S1] are more proactive, with some mobility-dependent location updates. Note that intelligent flooding schemes, which reduce the number of message retransmission yet preserving reachability, are discussed in [SSZ,SSS]. Multi-path schemes are well known in wired networks. They are captured in a link state routing protocol in Internet called OSPF [Mo] by the notion of equal cost multi-path, where traffic should be split equally between all the equal cost paths. They were proposed for non-location-based routing in wireless networks in [Le,RG,NCD,VG,ZG] and are used in traffic load balancing, for minimizing delay, and for QoS routing. In these methods, the second path is selected at the destination node among successful routes. In these schemes, route discovery is followed by selecting two or more paths from destination to source, among those found in the search process. The second path is maximally disjoint with the first one, and can serve for backup routing or splitting the traffic. We note that the whole path must arrive to destination node (so that destination may determine disjoint paths), thus message length increases with each hop, and the solution is not scalable. Moreover, if the second path is not fully disjoint with the first one, only the disjoint portion of the two paths from the last common node of two paths to the destination may arrive at destination, since intermediate nodes normally forward only the first copy of route discovery message. Therefore the second path from source to the last common node is canceled by the last common node, and destination is not aware of it. Wu [W] introduced a different approach. The two paths are created during route discovery process, by using two colors to divide all nodes into two disjoint sets, and find one route to destination in each of the set. Each node colors itself after receiving a message from one or both routes. In our proposed (scalable) location-based localized multi-path algorithm (which was first reported in our technical report [SL-tr] in 1998), the sender may initialize c paths toward destination, to provide multiple paths with controlled communication overhead. In these methods, past traffic at each node needs to be memorized (however, only message id is memorized), which applies also to the directional algorithms [BCSW,KV], LAR2 [KV], f-gedir [SL1], and DFS based routing [SRV]. Currently, one of main directions in ad hoc research is scalability. Routing algorithms should perform well for wireless networks with arbitrary number of nodes. To achieve scalability, we replace existing OðnÞ average (LAR2) or worst-case (f-gedir) multi-path routing pffiffi algorithms with an Oð n Þ algorithm, where n is the number of nodes in the network, and the measure refers to the expected number of nodes in the network receiving routing packet. Algorithms [BCSW,KV] apply multi-path strategies with linear communication overhead, and are not scalable. 3. Known location-based routing methods Several GPS-based methods were proposed in by using the notion of progress. Define progress as the distance between the transmitting node and receiving node projected onto a line drawn from transmitter toward the final destination. A neighbor is in forward direction if the progress is positive (for example, for transmitting node S and receiving nodes A; C and F in Fig. 1); otherwise it is said to be in backward direction (e.g. nodes B and E in Fig. 1). In the random progress E B C A S A F Fig. 1. Progress based routing methods. D

4 X. Lin, I. Stojmenovic / J. Parallel Distrib. Comput. 63 (2003) method [NK], packets destined toward D are routed with equal probability towards one intermediate neighboring node that has positive progress. The rationale for the method is that, if all nodes are sending packets frequently, probability of collision grows with the distance between nodes (assuming that the transmission power is adjusted to the minimal possible), and thus there is a trade-off between the progress and transmission success. Takagi and Kleinrock [TK] proposed MFR routing algorithm, in which packet is sent to the neighbor with the greatest progress (e.g. node A in Fig. 1). We shall reformulate the MFR method in order to facilitate its implementation. Let a b denote the dot products of vectors a and b: Consider the dot products of vectors originating from destination D and ending at nodes in the network. Clearly DS DA ¼jDSjjDA 0 j where A 0 is the projection of A on the line DA (see Fig. 1). The sign is assumed here to be positive; it can be shown that, in case of negative dot product, D must be a neighbor of S. Thus the considered dot product is minimal exactly when the progress in maximal. The goal in the MFR algorithm [TK] is, therefore, to minimize the dot product. Note that the node that minimizes the dot product (the selected node) may not have a forward progress. The MFR algorithm is loop-free [SL1]. Recently, three articles [BCSW,KV,KSU] independently reported variations of fully distributed routing protocols based on direction of destination. In these directional routing methods, node A uses the location information for B and its one hop neighbors to obtain B s direction, and then transmits a message m to several neighbors whose direction (looking from A) is closest to the direction of D: The methods differ in the choice of direction ranges. In the compass routing method (referred here also as the DIR method) proposed by Kranakis et al. [KSU], the source or intermediate node A uses the location information for the destination D to calculate its direction. The location of one hop neighbors of A is used to determine for which of them, say C; is the direction AC closest to the direction of AD (that is, the angle CAD is minimized). The message m is forwarded to C: This process repeats until the destination is, hopefully, reached. Basagni et al. [BCSW] described a distance routing effect algorithm for mobility (DREAM). The source or any intermediate node A calculates the direction of destination D and, based on the mobility information about D; chooses an angular range. The message m is forwarded to all neighbors whose direction belongs to the selected range. The range is determined by the tangents from A to the circle centered at D and with radius equal to a maximal possible movement of D since the last location update. The area containing the circle and two tangents is referred as the request zone in [KV]. DREAM algorithm [BCSW] incorporates the idea of triggering the sending of location updates by the moving nodes autonomously at a rate and hop distance that correspond to the node s mobility rate. Ko and Vaidya [KV] described, independently at the same conference, two very similar algorithms, and a few modifications of them. In the location-aided routing (LAR) algorithm [KV], the request zone is fixed from the source, and a node which is not in the request zone does not forward a route request to its neighbors. If the source has no neighbors within the request zone, the zone is expanded to include some. The size of the request zone depends on the average speed of the destination s movement and time elapsed since the last known location of the destination was recorded [BCSW,KV]. The definition of the request zone [BCSW,KV] was modified in [S2] in order to provide uniform framework with the corresponding notions in GEDIR and MFR methods. Stojmenovic [S2] discusses the V-GEDIR, CH- MFR and R-DIR methods, in which m is forwarded to exactly those neighbors which may be best choices for a possible position of destination (using the appropriate criterion). The request zone in R-DIR method [S2] may include one or two neighbors that are outside of angular range, because they can have the closest direction for the tangents to the circle. In V-GEDIR method, these neighbors are determined by intersecting the Voronoi diagram of neighbors with the circle (or rectangle) of possible positions of destination, while the portion of the convex hull of neighboring nodes is analogously used in the CH-MFR method. Ko and Vaidya [KV] discussed various enhancements to their basic technique. The LAR scheme 1 [KV] proposes an alternative definition of the request zone, as the smallest rectangle that includes current location of S and the expected zone of destination (a circular region). The request zone is thus increased, with increased chances of reaching destination but also with increased flooding. The modifications in [KV] include sending route requests before the message itself [JM]. Note that a route request may be considered as a routing of short messages. Nodes may update their location information with each exchange of messages between them. Messages may contain source location also to update location information at intermediate nodes. Recovery procedures based on partial or full flooding, to start flooding if the given algorithm fails to find the route within a timeout interval, are proposed by both papers [BCSW,KV]. Ko and Vaidya [KV] also proposed the LAR scheme 2. In this scheme, the source or each intermediate node A will forward the message to all nodes that are closer to the destination than A is (more precisely, at most d farther from the destination than node A; to account for possible location error). This scheme

5 26 X. Lin, I. Stojmenovic / J. Parallel Distrib. Comput. 63 (2003) therefore suggests the use of geographic distance instead of direction. Simulation results presented in [BCSW] using a discrete event simulator show that the dynamic source routing protocol [JM] has a % larger end-to-end delay than the DREAM protocol. The average number of data bits transmitted per data bits delivered is consistently lower for both LAR schemes as compared to flooding [KV]. Therefore adding location information to the routing tables in all nodes resulted in significant improvement in the performance over the existing methods that do not use such information. Despite these advantages, the proposed methods [BCSW,KV] have some drawbacks. They have considerable flooding rates, and the directional methods are shown in [SL1] not to guaranty loop-free paths. Finn [F] proposed Cartesian routing method, which allows choosing any successor node that makes progress toward the packet s destination. The best choice depends on the complete topological knowledge. Finn [F] adopted the greedy principle in his simulation: choose the successor node that is closest to the destination. When no node is closer to the destination than current node, the algorithm performs a sophisticated procedure that does not guaranty delivery. In the example in Fig. 2, sender S selects node B that is closer to D than A: The path selected by the algorithm is SBEFGHID and consists of seven hops. GEDIR routing algorithm [SL] is a variant of greedy routing algorithm [F] with a delayed failure criterion. GEDIR, MFR, and compass routing algorithms fail to deliver message if the best choice for a node currently holding message is to return it to the previous node [SL1]. Stojmenovic and Lin [SL1] proposed a modification to all three basic algorithms to avoid message dropping. Each algorithm proceeds as described until the message is supposed to be dropped by the corresponding algorithm at a concave node A: Flooding is performed only at concave nodes, while every other intermediate node should act with receiving message as in the corresponding basic routing algorithm. After forwarding the packet to all its neighbors, a concave node shall mark packet id in the entry corresponding to given destination, and refuse to accept the same packet from any of its neighbors. Neighbors of concave node will A B J recognize that the message was flooded, and will ignore it when selecting future best neighbors. In effect, the concave node has disconnected itself with respect to given packet. It is not necessary to carry additional flooding bit with the packet. The delivery of the packet to the destination is guaranteed (assuming that the network is connected graph). The methods will be refereed to as flooding GEDIR, flooding DIR, and flooding MFR routing methods (abbreviated as f- GEDIR, f-dir and f-mfr). It is straightforward to show that f-gedir and f-mfr methods guarantee delivery (for connected graphs without message collisions) and that they are loop-free (neither of properties is valid for f-dir algorithm). A depth first search (DFS) based routing algorithm was proposed in [SRV]. Each node follows DFS in searching for destination, and orders all its neighboring nodes according to their distance from destination, the closer ones being preferred. The algorithm guarantees delivery, and nodes need to memorize past traffic (as demanded by DFS on arbitrary graph) but the flooding rate for sparse networks is significant, as shown in [SRV]. A GFG routing algorithm that guarantees delivery by finding a simple path between source and destination is described in [BMSU]. It is based on constructing a planar subgraph (e.g. Gabriel graph) and routing in the planar subgraph that guarantees delivery. This procedure is called whenever greedy algorithm fails, and is recalled whenever a closer node (than previously failing node) is encountered. GFG algorithm [BMSU] was implemented in [KK] by including MAC layer considerations and location updates for experiments with moving nodes. Karp and Kung [KK] also showed the scalability of the algorithm and its better performance than the well-known DSR algorithm [BMJHJ]. The performance of GFG algorithm was improved in [DSW] by adding a shortcut procedure and applying internal node concept (see [SSZ]). The hop count is very close to the hop count of shortest path algorithm for dense graphs (below 20% excess hop count for graphs with average degrees X6) and about twice longer for sparse graphs. Corresponding power and cost aware routing algorithms with guaranteed delivery are developed in [SD]. Routing protocols related to GPS, and using congestion control, which forces routing messages to follow different path, if the node is congested, have been studied in [BFD,BDF]. E C F Fig. 2. Alternate ABJBCJCFGHD and disjoint ABJCFGHD paths from A to D: G H 4. Alternate and disjoint routing methods Each of proposed new schemes uses one of three basic algorithms (GEDIR, MFR or DIR) as its underlying algorithm for the criterion in selecting the best neighbor

6 X. Lin, I. Stojmenovic / J. Parallel Distrib. Comput. 63 (2003) to forward the message. As in [SL1], it was observed that the performance of MFR variant is very similar to the performance of GEDIR variant and leads to loop-free algorithms, while performance of DIR variant was always somewhat worse and not loop-free. Therefore we decided to refer only to GEDIR in the sequel, that is, to geographic distance as the criterion in neighbor selection. In the original GEDIR method [SL1], every intermediate node will forward the message to its best neighbor (the one closest to the destination). Forwarding stops if the best neighbor is the neighbor message came from, that is, at concave node. Methods differ in the way they handle concave nodes routing decisions. In the alternate GEDIR algorithm, each intermediate node forwards ith received copy of the same message to the ith best (closest to destination) neighbor. Thus concave nodes of the original GEDIR method do not stop transmitting; however a node becomes concave if it has fewer neighbors than the number of received copies. Temporary loops may be created, but the exit is guaranteed with maximum node degree. In the disjoint GEDIR method, each intermediate node A; upon receiving the message, will forward it to its best neighbor among those who never received and forwarded the same message before. After forwarding the message, node A becomes inactive with respect to that message, and rejects further copies of it. All neighbors of A receive message forwarded by A and may eliminate A from their list of candidate neighboring nodes for forwarding the same message. A node stops forwarding the message (e.g. becomes concave) if there is no neighbors left to forward the message. Loops cannot be created by the algorithm design. Consider an example for alternate and disjoint methods in Fig. 2, for routing from A to D: In the alternate method, A sends to B; B to J; J back to B since B is best neighbors for J (note that J would be a concave node in GEDIR), B to the second best choice C; C to the best choice J; J to second best choice C; C to the second best choice F; F to G; G to H and H to D: In the disjoint method, A sends to B and disconnects, B sends to J and disconnects, J to C (since B is not available) and disconnects etc. until D is reached. Fig. 3 illustrates why disjoint method is more successful than alternate one. This conclusion is also confirmed by experiments. In the alternate method, node A sends message to best neighbor node B; B back to A; A to the second best neighbor C; C to the best neighbor B; B to the second best neighbor C; and C to the second best neighbor A which is concave node for the method since it has no more neighbors. In the disjoint method, A sends to the best neighbor B and rejects further messages, B sends to the best remaining neighbor C; C sends to E since A and B are not available for the message, etc. until D: F E G 5. Multi-path routing methods H C B Fig. 3. Alternate ABACBCA and disjoint ABCEFGHIJD paths from A to D: G F H S A I Fig. 4. The first path SABCD and second original (SFA), alternate (SFAIJCD), and disjoint (SFHIJ) paths from S to D: In the multi-path method, the source node forwards the message to c best neighbors, according to selection criterion. In the original c-gedir method, each node forwards the first received copy to the neighbor that is closest to destination (or stops forwarding if the node is concave) and does not forward other received copies. In the alternate c-gedir method, intermediate nodes on each path follow the described behavior whenever they receive any copy of the message (irrelevant from which of c initiated paths the message originates). Thus ith received copy of the same packet is forwarded to ith closest to destination neighbor, up to the number of neighbors. Nodes in the disjoint c-gedir algorithm do not receive the same packet twice; thus the scheme merely attempts to create c disjoint paths between source and destination nodes. The proposed multi-path methods provide robustness without much additional flooding. In all three methods, if destination D is one of neighbors of the current node C; the message is delivered to D; which might be an exception to the corresponding behavior at C: Consider an example in Fig. 4, where message is to be sent from S to D using c ¼ 2 paths. The radius of the I A B J E J C D D

7 28 X. Lin, I. Stojmenovic / J. Parallel Distrib. Comput. 63 (2003) G S H unit graph is shown below the graph. The original methods produce the first successful path SABCD, while the second path SFA stops at A: Both paths are shown with bold lines. Two alternate paths are SABCD and SFAIJCD. New edges in alternate path are shown with dashed lines. Finally, the disjoint method produces the same first path SABCD while the second path, which fails, is SFHIJ (new edges on the path are shown with dotted lines). Fig. 5 shows an example where the first path SFK from S to D fails by all three methods, while the second path SABD is successful and is same for all three methods. It was observed experimentally that co4 are reasonable choices for c; while the additional success rate for c43 does not compensate for additional flooding rate. We note that flooding effect, or the preferred choice of parameter c; may be related to the need to construct alternative QoS routes in the network. 6. Performance evaluation F A I K Fig. 5. The first path SFK fails, the second path SABD is successful. The experiments were carried out using random unit graphs, on both static and moving nodes. Each of n nodes is chosen by selecting its x and y coordinates at random in the interval ½0; 100Þ: In order to control the average node degree d; we sort all nðn 1Þ=2 (potential) edges in the network by their length, in increasing order. The radius R that corresponds to chosen value of d is equal to the length of ðnd=2þth edge in the sorted order. In experiments with static networks, generated graphs, which were disconnected, are ignored (connectivity cannot be preserved with mobility). We experimented with the following network sizes: n ¼ 20; 50, and 100. For n ¼ 20; the average degrees tested were d ¼ 2; 3, 4 and 5; for n ¼ 50; d ranges between 4 and 8; and for n ¼ 100; d is between 4 and 14. For each graph, 50 random source destination pairs are chosen, and the routing was performed in both directions (thus 100 B J D C E routing tasks per graph). Averages over 20 graphs with the same parameters are then found. We shall present here only results for n ¼ 100: Since our final goal is to provide a localized algorithm that will compete with the shortest path algorithm, we have used, in this paper, flooding rate as an appropriate measure of communication overhead. Flooding rate is the ratio of the number of message transmissions and the shortest possible hop count between two nodes. Each transmission in multiple routes is counted, and message can be sent to all neighbors with one transmission. The hop count refers to the smallest number of transmissions on a route between two nodes that is established by applying particular algorithm (in other words, it corresponds to the delay in receiving the first copy of a packet). Finally, the success (or delivery) rate is the ratio of delivered packets. The experiments on moving nodes were carried as follows. Each node moves according to the following mobility pattern. It chooses a random destination and random number mov-it, the number of steps (iterations) it will take to reach the destination, from a given interval [min-mov-it, max-mov-it]. When node reaches its destination, it makes a new selection of mov-it and random destination and repeats the process. One routing task per iteration is performed in the network, by choosing source and destination nodes at random. MAC layer was not implemented (thus end-to-end data delay [MC] is replaced with hop count [BMJHJ]), so possible collisions of location update and routing traffic are assumed to be handled by either acknowledgements within IEEE or by time division multiple access in multi-hop ad hoc networks (see a recent survey [L]). By choosing mov-it parameter, node in effect chooses its speed. We assumed that the speed of performing routing task is significantly greater than the node movement. The size of iteration should be chosen such that each node performs very few, if any, location update activities during the iteration. Each node sends location update message to all its neighbors whenever it detects that an existing link is broken, or a message from a new neighbor is heard. Reactive flooding based destination search method, described in introduction, is used. It was observed that the failure rate due to using imprecise neighborhood information is far below 1%, and that mobility had no significant negative impact on routing process. The measured data for static and moving networks did not differ significantly. We have therefore chosen to present data only for static networks. The communication overhead imposed by location updates was ignored, since it was the same for all compared schemes (it was also ignored in other relevant experiments, e.g. [KK,KV]). A recent survey [S1] discusses the issue in detail. LAR2 scheme from [KV] is added in the experiments, since it had best performance among schemes proposed

8 X. Lin, I. Stojmenovic / J. Parallel Distrib. Comput. 63 (2003) by the same authors, according to their measurements. In one transmission step (of broadcast type), the source or each intermediate node A will forward the message to all nodes that are closer to the destination than A is (thus we selected value d ¼ 0). When a message is to be routed from source S to destination D; the nodes located inside a circle centered at assumed position of D and with radius SD might all receive the message, thus OðnÞ nodes might be flooded. We assumed that nodes in LAR2 do memorize messages and do not retransmit the same message more than ones. Nodes in LAR2 which have no closer neighbor to destination than themselves do not retransmit the message. LAR2 method did not offer reliable success at low degrees (78% for d ¼ 4) while the success rate for larger d for satisfactory (95% for d ¼ 6). Hop counts range from 7.5 at d ¼ 4 to 5.7 at d ¼ 6to3:9 atd ¼ 10: The flooding rate of LAR2 increased significantly with the degree (from about twice SP flooding at d ¼ 4 and 4.3 times at d ¼ 6to49 atd ¼ 10 and about 14 at d ¼ 14 or over 40% of nodes). The second path seems to improve success rate of single path method by over 10% for low degree networks, by about 5% for medium degrees, and by 1% for high degree networks that already have very high success rates. Adding memory for past traffic to multi-path methods seems to have significant impact, especially for disjoint methods that achieve similar success rates as LAR2 even for the single path case. It appears that the third path adds about 1% in success rate with high price in flooding rate. Adding the fourth path does not seem to give any benefit in our experiments, but 4-path method applied on n ¼ 100 and d ¼ 6 still has lower flooding rate than LAR2 method, with better success rates for disjoint path version. Therefore multi-path methods provide scalability and basis for QoS routing. We have added f-gedir scheme from [SL1], which was shown to perform better than LAR2 for all network densities. We have also added DFS-based routing algorithm [SRV], which has superior performance for dense networks, but has significant flooding rate for sparse networks. Table 1 presents experimental results on delivery rates of multiple path methods for n ¼ 100 and d ¼ 6: The improvements obtained by adding multiple paths and/or past traffic memory are notable. The success rate increases by about 3 5% from c ¼ 1to 2, by additional 2% from c ¼ 2 to 3, and by 1% from c ¼ 3 to 4. Alternative methods have about 5% higher success rates than original ones for all c values. Disjoint methods have about 15 17% better success rate than the corresponding original ones, for all values of c: Similar results were obtained for n ¼ 100 and d ¼ 4; 5, and 7. It is worth to note that disjoint methods achieve almost same success rate as LAR2 even at c=1 value, and involve almost no unnecessary flooding. Delivery rates Table 1 Delivery rates for multiple path methods for n ¼ 100 and d ¼ 6 c Value 1 (%) 2 (%) 3 (%) 4 (%) Original GEDIR Original DIR Original MFR Alternate GEDIR Alternate DIR Alternate MFR Disjoint GEDIR Disjoint DIR Disjoint MFR LAR Table 2 Delivery rates for multiple path methods for n ¼ 100; d ¼ 4; 5; 7 and c ¼ 1; 2; 3; 4 Method Degree c ¼ 1 (%) c ¼ 2 (%) c ¼ 3(%) c ¼ 4 (%) Original GEDIR Alternate GEDIR Disjoint GEDIR Original GEDIR Alternate GEDIR Disjoint GEDIR Original GEDIR Alternate GEDIR Disjoint GEDIR LAR LAR LAR Table 3 Hop counts for multiple path methods for n ¼ 100 and d ¼ 6 c Value SP Original GEDIR Original DIR Original MFR Alternate GEDIR Alternate DIR Alternate MFR Disjoint GEDIR Disjoint DIR Disjoint MFR LAR f-gedir 7.22 DFS for f-gedir and DFS based routing are 100%, and they are not shown in Table 1. Table 2 presents delivery rates for few more degree values, for original, alternate and disjoint c-gedir (for c ¼ 1; 2; 3; 4) and LAR2 methods. Table 3 presents hop counts for multiple path methods. Alternate methods have slight hop count increase while disjoint methods

9 30 X. Lin, I. Stojmenovic / J. Parallel Distrib. Comput. 63 (2003) Table 4 Flooding rates for multiple path methods for n ¼ 100 and d ¼ 6 c Value SP Original GEDIR Original DIR Original MFR Alternate GEDIR Alternate DIR Alternate MFR Disjoint GEDIR Disjoint DIR Disjoint MFR LAR f-gedir 3.11 DFS 3.48 have about one extra hop, compared to original methods. This is due to increased success rate, coming from paths to destination discovered by second and later paths, when the first path failed. However, second and other paths tend to be longer than the first one, since the best looking route from the source has been reserved for failing path. Note that hop counts for f-gedir and DFS based routing are higher than for other considered methods, which is trade-off for guaranteed delivery. For denser graphs f-gedir and DFS based scheme become superior methods, while for sparser graphs multi-path methods provide better trade-off. Table 4 gives the corresponding flooding rates, with numbers around c (that is, about c shortest paths), which is expected. The first path has roughly the length of the shortest path (or even shorter, due to increased failure rates that results in shorter paths, which do not reach destination. Two paths together are more successful, but one of them is forced to be longer than shortest path, thus flooding rates are over 2 for alternate and disjoint methods (due to lower success rates, they are below 2 for original methods). Similar analysis applies to third and fourth paths. Significantly higher flooding rates for LAR2 method can be easily observed. The somewhat better success rate and hop count for LAR2 are achieved with about twice larger flooding rates (for c ¼ 2 and 3), which is not justified. Observe that for c ¼ 2 and 3 disjoint c-gedir offers over 92% and 96% success rate, respectively, one less hop on average, and three times and 20 30% lower flooding rates compared to f-gedir and DFS, which is a compensation for guaranteed delivery of f-gedir and DFS based schemes. In summary, multi-path methods have significantly lower flooding rates than LAR2 at moderate and high degrees (from d ¼ 6 for n ¼ 100). LAR2 has lower hop counts, but the difference is significant only for small degree networks. Thus our multi-path based methods are superior to LAR2 for higher degree networks, while better delivery rates offer satisfactory compensation for higher flooding rate for lower degree networks. 7. Conclusion The proposed demand-based multi-path algorithms operate in the same manner if some nodes are in the sleep mode. The only modification is to include a condition at each node to ignore its neighbors that are temporarily not receiving messages. If nodes that are in the sleep mode are actual destinations, the messages for them should be stored until they are ready to receive them. Our experiments show that c-gedir and c-mfr may provide multiple paths with comparable success rates and much smaller flooding rates, with respect to LAR2. They also give high success rates with low flooding rates for low degree networks, compared to f-gedir and DFS based schemes, which seem to pay high price for guarantying delivery in low degree networks. Further, the performance of multi-path methods is relatively stable with respect to network density, compared to other methods. The multi-path routing scheme proposed in this paper (and other methods considered here) can clearly be combined with a number of location update schemes in order to produce a full routing protocol. Thus one paper does not seem to be sufficient to design a routing algorithm satisfying listed desirable properties, and/or to find the best combination of basic routing scheme and location update scheme. We assumed here that weaker basic routing component would contribute to weaker overall routing protocol that handles mobility, and therefore limited our scope by considering only simple location update schemes, or even static networks in initial experiments. That allowed us to concentrate on low communication overhead of the basic routing algorithm, measured by flooding rates, and scalability, and proposed multi-path algorithms that can be used as basis for a complete routing solution in mobile wireless pffiffiffi networks. Oð n Þ multi-path algorithm provides scalability and better relative performance over competitive methods for larger values of n (we have confirmed that by doing experiments with various values of n). Selecting proper value for c controls flooding rate. We concluded that values c ¼ 1; 2 or 3 may be justified, based on network density, desired success level, and desired tradeoff with flooding rate as overhead. The ultimate goal is to find the best combination of basic routing and location update schemes, for which an in-depth study is necessary because of possible interactions between ingredients.

10 X. Lin, I. Stojmenovic / J. Parallel Distrib. Comput. 63 (2003) Acknowledgments This research is partially supported by NSERC and CONACYT A Grants. References [BCSW] S. Basagni, I. Chlamtac, V.R. Syrotiuk, B.A. Woodward, A distance routing effect algorithm for mobility (DREAM), Proceedings of the MOBICOM, 1998, pp [BFD] A. Boukerche, A. Fabbri, S.K. Das, Message traffic control capabilities of the R-DSDV protocol in mobile ad hoc networks, Proceedings of the ACM Modeling, Analysis, and Simulation of Wireless and Mobile Systems, 2001, pp [BDF] A. Boukherche, S.K. Das, A. Fabbri, Analysis of randomized congestion control with DSDV routing in ad hoc wireless networks, J. Parallel Distributed Systems 61 (2001) [BMJHJ] J. Broch, D.A. Maltz, D.B. Johnson, Y.C. Hu, J. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, Proceedings of the MOBICOM, 1998, pp [BMSU] P. Bose, P. Morin, I. Stojmenovic, J. Urrutia, Routing with guaranteed delivery in ad hoc wireless networks, Third International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Seattle, August 20, 1999, pp ; ACM/Kluwer Wireless Networks 7(6) (2001) [CHH] S. Capkun, M. Hamdi, J.P. Hubaux, GPS-free positioning in mobile ad-hoc networks, Proceedings of the Hawaii International Conference on System Sciences, January [DSW] S. Datta, I. Stojmenovic, J. Wu, Internal node and shortcut based routing with guaranteed delivery in wireless networks, Cluster Computing 5 (2) (2002) [EGHK] D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Next century challenges: scalable coordination in sensor networks, Proceedings of the MOBICOM, Seattle, 1999, pp [F] G.G. Finn, Routing and addressing problems in large metropolitan-scale internetworks, ISI Research Report ISU/RR , March [G] S. Giordano, Mobile ad hoc networks, in: I. Stojmenovic (Ed.), Handbook of Wireless Networks and Mobile Computing Handbook, Wiley, New York, 2002, pp [IETF] IETF Manet charter, manet-charter.html. [JM] D. Johnson, D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in: T. Imielinski, H. Korth (Eds.), Mobile Computing, Kluwer Academic Publishers, Dordrecht, [KK] B. Karp, H.T. Kung, GPSR: greedy perimeter stateless routing for wireless networks, Proceedings of the MOBICOM, August 2000, pp [KSU] E. Kranakis, H. Singh, J. Urrutia, Compass routing on geometric networks, Proceedings of the 11th Canadian Conference on Computational Geometry, Vancouver, August [KV] Y.B. Ko, N.H. Vaidya, Location-aided routing (LAR) in mobile ad hoc networks, MOBICOM, 1998, pp ; Wireless Networks, 6(4) (2000) [L] [Le] [M] [Mo] [MC] [N] [NCD] [NK] [RG] [Sh] [SD] [SL] [SL1] [SL-tr] [S1] [S2] [SRV] [SSS] E. Lloyd, Broadcast scheduling for TDMA in wireless multi-hop networks, in: I. Stojmenovic (Ed.), Wireless Networks and Mobile Computing Handbook, Wiley, New York, 2002, pp S.J. Lee, Routing and multicasting strategies in wireless mobile ad hoc networks, Ph.D. thesis, University of California, Los Angeles, CA, USA, September Metricom Richonet wireless modem, com. J. Moy, OSPF version 2. Internet Request For Comments RFC 1247, July J.P. Macker, M.S. Corson, Mobile ad hoc networking and the IETF, Mobile Comput. Commun. Rev. 2 (1) (1998) Nokia Rooftop wireless routing system, A. Nasipuri, R. Castaneda, S.R. Das, On-demand multipath routing for mobile ad hoc networks, Proceedings of the IEEE INFOCOM, R. Nelson, L. Kleinrock, The spatial capacity of a slotted ALOHA multihop packet radio network with capture, IEEE Trans. Commun. 32 (6) (1984) J. Raju, J.J. Garcia-Luna-Aceves, A new approach to on-demand loop-free multipath routing, Proceedings of the IEEE International Conference on Computer Communications and Networks, Boston, October 1999, pp T. Shepard, A channel access scheme for large dense packet radio networks, Proceedings of the SIGCOMM Conference on Communications Architectures, August I. Stojmenovic, S. Datta, Power and cost aware localized routing with guaranteed delivery in wireless networks, Proceedings of the Seventh IEEE Symposium on Computers and Communications ISCC, Taormina, Sicily, Italia, July 1 4, 2002, pp I. Stojmenovic, Xu Lin, Power-aware localized routing in wireless networks, IEEE Trans. Parallel Distributed Systems 12 (11) (2001) I. Stojmenovic and X. Lin, GEDIR: loop-free location based routing in wireless networks, IASTED International Conference on Parallel and Distributed Computing and Systems, November 3 6, 1999, Boston, MA, USA, pp ; IEEE Trans. Parallel Distributed Systems 12(10) (2001) I. Stojmenovic, Xu Lin, Geographic distance routing in ad hoc wireless networks, Computer Science, SITE, University of Ottawa, TR-98-10, December I. Stojmenovic, Location updates for efficient routing in ad hoc networks, in: I. Stojmenovic (Ed.), Handbook on Wireless Networks and Mobile Computing, Wiley, New York, 2002, pp I. Stojmenovic, Voronoi diagram and convex hull based geocasting and routing in wireless networks, SITE, University of Ottawa, TR-99-11, December 1999, I. Stojmenovic, M. Russell, B. Vukojevic, Depth first search and location based localized routing and QoS routing in wireless networks, IEEE International Conference on Parallel Processing, August 21 24, 2000, Toronto, pp M. Seddigh, J. Solano, I. Stojmenovic, RNG and internal node based broadcasting algorithms for wireless one-to-one networks, ACM Mobile Comput. Commun. Rev. 5 (2) (2001)

Internal node and shortcut based routing with guaranteed delivery in wireless networks

Internal node and shortcut based routing with guaranteed delivery in wireless networks Internal node and shortcut based routing with guaranteed delivery in wireless networks Susanta Datta 1, Ivan Stojmenovic 1,2 and Jie Wu 3 1 SITE, University of Ottawa, Ottawa, Ontario K1N 6N5, Canada ivan@site.uottawa.ca

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

A routing strategy and quorum based location update scheme for ad hoc wireless networks

A routing strategy and quorum based location update scheme for ad hoc wireless networks A routing strategy and quorum based location update scheme for ad hoc wireless networks Ivan Stojmenovic and Bosko Vukojevic Computer Science, SITE, University of Ottawa, Ottawa, Ontario K1N 6N5, Canada

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Efficient and Robust Geocasting Protocols for Sensor Networks

Efficient and Robust Geocasting Protocols for Sensor Networks Efficient and Robust Geocasting Protocols for Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Abstract- Geocasting is

More information

Chapter 4 Routing in Wireless Sensor Networks

Chapter 4 Routing in Wireless Sensor Networks Chapter 4 Routing in Wireless Sensor Networks Hannes Frey, Stefan Rührup, and Ivan Stojmenović Abstract Wireless sensor networks are formed by small sensor nodes communicating over wireless links without

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing 309 Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing Sinchan Roychowdhury Instrumentation Control Engineering Calcutta Institute of Engineering & Management Kolkata, India

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

A Position-Based Connectionless Routing Algorithm for MANET and WiMAX under High Mobility and Various Node Densities

A Position-Based Connectionless Routing Algorithm for MANET and WiMAX under High Mobility and Various Node Densities Information Technology Journal 7 (3): 458-465, 08 ISSN 1812-5638 08 Asian Network for Scientific Information A Position-Based Connectionless Routing Algorithm for MANET and WiMAX under High Mobility and

More information

Void Traversal for Guaranteed Delivery in Geometric Routing

Void Traversal for Guaranteed Delivery in Geometric Routing Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v

More information

(General article) Position Based Routing Technique: Greedy Perimeter Stateless Routing for Wireless Networks

(General article) Position Based Routing Technique: Greedy Perimeter Stateless Routing for Wireless Networks ijesm www.ijesm.com International Journal of Engineering, Science and Metallurgy (General article) Position Based Routing Technique: Greedy Perimeter Stateless Routing for Wireless Networks Niyati Bansal

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

arxiv:cs/ v1 [cs.dc] 22 Nov 2006

arxiv:cs/ v1 [cs.dc] 22 Nov 2006 arxiv:cs/0611117v1 [cs.dc] 22 Nov 06 Abstract 2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing Mark Miyashita Mikhail Nesterenko Department of Computer Science Kent State University

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Power and cost aware localized routing with guaranteed delivery in unit graph based ad hoc networks

Power and cost aware localized routing with guaranteed delivery in unit graph based ad hoc networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2004; 4:175 188 (DOI: 10.1002/wcm.162) Power and cost aware localized routing with guaranteed delivery in unit graph based ad hoc

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks

Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks Mohit Chawla 1, Nishith Goel 2, Kalai Kalaichelvan 3, Amiya Nayak 4, and Ivan Stojmenovic 4 1 IIT Guwahati,

More information

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3.

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3. Geographic Protocols in Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Table of Contents 1. Introduction 2. Geographic

More information

A Proposed Routing Protocol for MANET

A Proposed Routing Protocol for MANET International Journal of Engineering & Technology IJET-IJENS Vol: 11 No: 02 101 A Proposed Routing Protocol for MANET Mamoun Hussein Mamoun Faculty of Computer and Information Sciences Mansoura University,

More information

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network Global Journal of Computer Science and Technology Volume 11 Issue 1 Version 1.0 February 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online

More information

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract

More information

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1424-1429 3 rd World Conference on Information Technology (WCIT-2012) Comparison of routing protocols in mobile ad-hoc wireless networks

More information

BGR: Blind Geographic Routing for Sensor Networks

BGR: Blind Geographic Routing for Sensor Networks BGR: Blind Geographic Routing for Sensor Networks Matthias Witt 1 and Volker Turau 1 1 Department of Telematics, Hamburg University of Technology, Hamburg, Germany {matthias.witt,turau}@tuhh.de Abstract

More information

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

Progress and Location Based Localized Power Aware Routing for ad hoc and Sensor Wireless Networks

Progress and Location Based Localized Power Aware Routing for ad hoc and Sensor Wireless Networks International Journal of Distributed Sensor Networks, 2: 147 159, 2006 Copyright Taylor & Francis Group, LLC ISSN: 1550-1329 print/1550-1477 online DOI: 10.1080/15501320500259159 Progress and Location

More information

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes Ruchi Khandelwal 1 & Akhilesh Kosta 2 Department of Computer Science and Engineering

More information

The General Analysis of Proactive Protocols DSDV, FSR and WRP

The General Analysis of Proactive Protocols DSDV, FSR and WRP Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks

Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks Broadcast algorithms for Active Safety Applications over Vehicular Ad-hoc Networks M.N. Mariyasagayam, M. Lenardi HITACHI Europe, "Le Thélème", 1503 Route des Dolines, 06560 Sophia Antipolis, France Phone:

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department

Mobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department Mobile Advanced Networks Position-based routing geometric, geographic, location-based Navid Nikaein Mobile Communication Department Navid Nikaein 2010 1 Reminder In topology-based routing, each node has

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

Performance of Various Routing Protocols in Mobile Ad Hoc Networks-A Survey

Performance of Various Routing Protocols in Mobile Ad Hoc Networks-A Survey Research Journal of Applied Sciences, Engineering and Technology 6(22): 4181-4185, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: January 26, 2013 Accepted: March

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Khaldoun Al Agha LRI, Paris XI University, Orsay, France Email: alagha@lri.fr

More information

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

Optimized Greedy Perimeter Stateless Routing

Optimized Greedy Perimeter Stateless Routing Optimized Greedy Perimeter Stateless Routing Neha Department of Electronics and Communication Engineering Punjab Technical University, Kapurthhala, Punjab, India Jogishwar Singh Sohal Department of Electronics

More information

A Survey on Performance Evaluation of MANET Routing Protocols

A Survey on Performance Evaluation of MANET Routing Protocols ISSN 2278 0211 (Online) A Survey on Performance Evaluation of MANET Routing Protocols Aviral Kumar Nishank Tyagi Vipin Kumar Abstract: The task of finding and sustaining routes in Mobile Ad-hoc Networks

More information

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Energy Aware and Anonymous Location Based Efficient Routing Protocol

Energy Aware and Anonymous Location Based Efficient Routing Protocol Energy Aware and Anonymous Location Based Efficient Routing Protocol N.Nivethitha 1, G.Balaji 2 1 PG student, 2 Asst.Professor Department of Electronics and Communication Engineering Angel College of Engineering

More information

DYNAMIC RESPONSE ZONE ROUTING FOR MANET

DYNAMIC RESPONSE ZONE ROUTING FOR MANET DYNAMIC REPONE ZONE ROUTING FOR MANET Rimantas Plestys, Rokas Zakarevicius Kaunas University of Technology, Department of Computer Networks, tudentu str. 50-4, Kaunas, Lithuania, rimantas.plestys@ktu.lt,

More information

Direction Forward Routing for Highly Mobile Ad Hoc Networks

Direction Forward Routing for Highly Mobile Ad Hoc Networks Ad Hoc & Sensor Wireless Networks, Vol. X, pp. 01 18 Reprints available directly from the publisher Photocopying permitted by license only c 2006 Old City Publishing, Inc. Published by license under the

More information

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined

More information

IMPORTANCE OF RELAY NODE SET FRAMEWORK FOR MANET COMMUNICATION ENVIRONMENT

IMPORTANCE OF RELAY NODE SET FRAMEWORK FOR MANET COMMUNICATION ENVIRONMENT IMPORTANCE OF RELAY NODE SET FRAMEWORK FOR MANET COMMUNICATION ENVIRONMENT Manoj Kumar Khinchi 1, Dr. Bharat Bhushan 2 1 Research Scholar of Department of computer science, Singhania University, Rajasthan,

More information

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Som Chandra Neema Venkata Nishanth Lolla {sneema,vlolla}@cs.ucr.edu Computer Science Department University of California, Riverside Abstract

More information

Design Guidelines for Routing Protocols in Ad Hoc and Sensor Networks with a Realistic Physical Layer

Design Guidelines for Routing Protocols in Ad Hoc and Sensor Networks with a Realistic Physical Layer TOPICS IN AD HOC NETWORKS Design Guidelines for Routing Protocols in Ad Hoc and Sensor Networks with a Realistic Physical Layer Ivan Stojmenovic, Amiya Nayak, and Johnson Kuruvila, SITE, University of

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Packet Routing using Optimal Flooding Protocol in Cluster based MANET IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya

More information

Chapter 11 Chapter 6

Chapter 11 Chapter 6 Routing Protocols References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid. A COMPLETE STUDY ON POWER AWARE ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK A. Kumaravel 1, Dr. M.Chandrasekaran 2 1 (Electronics and Communication Engineering, Paavai Engineering College,India) 2 (Electronics

More information

References. Forwarding. Introduction...

References. Forwarding. Introduction... References Routing Protocols H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

Scalable Position-Based Multicast for Mobile Ad-hoc Networks

Scalable Position-Based Multicast for Mobile Ad-hoc Networks Scalable Position-Based Multicast for Mobile Ad-hoc Networks Matthias Transier, Holger Füßler, Jörg Widmer, Martin Mauve, and Wolfgang Effelsberg University of Mannheim, Institut für Informatik, 683 Mannheim,

More information

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet * gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

More information

Performance Evaluation of Routing Protocols for MAC Layer Models

Performance Evaluation of Routing Protocols for MAC Layer Models IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 71-77 Performance Evaluation of Routing Protocols for MAC Layer Models Somya

More information

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

More information

Research Paper GNANAMANOHARAN ET AL., INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGY E-ISSN

Research Paper GNANAMANOHARAN ET AL., INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGY E-ISSN Research Paper PERFORMANCE ANALYSIS OF PROBABILISTIC BROADCAST ON DEMAND ROUTE DISCOVERY PROTOCOL FOR MOBILE AD HOC NETWORKS BASED ON NODE MOBILITY E.Gnanamanoharan 1, R.Bensraj 2 Address for Correspondence

More information

Jerrolyn Brees and Sukhamay Kundu Department of Computer Science Louisiana State University Baton Rouge, LA 70803, USA

Jerrolyn Brees and Sukhamay Kundu Department of Computer Science Louisiana State University Baton Rouge, LA 70803, USA Finding Shortest MultiPaths with O(N 2 ) Message Complexity Jerrolyn Brees and Sukhamay Kundu Department of Computer Science Louisiana State University Baton Rouge, LA 70803, USA Abstract This paper presents

More information

M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks

M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks Lynn Choi 1, Jae Kyun Jung 1, Byong-Ha Cho 1, and Hyohyun Choi 2 1 Korea University, Anam-Dong, Sungbuk-Ku, Seoul, Korea

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Comparative Analysis of Throughput and Dropped rate for Location-Aided Routing Protocol

Comparative Analysis of Throughput and Dropped rate for Location-Aided Routing Protocol Comparative Analysis of Throughput and Dropped rate for Location-Aided Routing Protocol Neelima Parsendia, Amit Sinhal Dept. of I.T., Technocrats Institute of Technology, Bhopal Abstract A wireless LAN

More information

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 6, 2013 ISSN (online): 2321-0613 Integrated Demand (IRA-ODGR) for MANET M J.Kalaiselvi 1 K.Sathishkumar 2 1 M.E. Student,

More information

Localized routing with guaranteed delivery and a realistic physical layer in wireless sensor networks

Localized routing with guaranteed delivery and a realistic physical layer in wireless sensor networks Computer Communications 29 (2006) 2550 2555 www.elsevier.com/locate/comcom Localized routing with guaranteed delivery and a realistic physical layer in wireless sensor networks Milos Stojmenovic *, Amiya

More information

Power-aware localized routing in wireless networks

Power-aware localized routing in wireless networks 1 Power-aware localized routing in wireless networks Ivan Stojmenovic and Xu Lin Computer Science, SITE, University of Ottawa, Ottawa, Ontario K1N 6N5, Canada ivan@site.uottawa.ca Abstract Recently, a

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Overhead Analysis of Reactive Shortest Single and Multi-path Routing Mechanism with Load Balance in MANET

Overhead Analysis of Reactive Shortest Single and Multi-path Routing Mechanism with Load Balance in MANET www.ijcsi.org https://doi.org/10.20943/01201605.102107 102 Overhead Analysis of Reactive Shortest Single and Multi-path Routing Mechanism with Load Balance in MANET K.MARIYAPPAN 1, Dr.M.KARNAN 2 1 Assistant

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Review of Location-Aware Routing Protocols

Review of Location-Aware Routing Protocols Review of Location-Aware Routing Protocols Review of Location-Aware Routing Protocols School of Business (IT), James Cook University, Cairns Campus, McGregor Road, Smith Field, QLD4870, Australia {Colin.Lemmon,

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent W. S. Wong and Victor C. M. Leung Department of Electrical and Computer Engineering The University of British

More information

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Mukesh Kumar Garg, Dr. Ela Kumar Abstract A Mobile Ad Hoc Network (MANET) is a group of wireless mobile computers (or nodes);

More information

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information